categ.: >

... simplifies and accelerates the development of proprietary communication solutions over th...ommunication solutions over the Internet. It implements a flexible message-oriented protocol on top of a single TCP connection. The transfered data ...ted protocol on top of a single TCP connection. The transfered data are scrambled using on-the-fly 128-bit AES encryption with random session keys, without need of SSL certificates. The security is provided in two different m...rity is provided in two different modes: symmetric encryption with shared secret key and asymmetric encryption with 1024-bit public/private keys. Transport level authentication is available with optional digital fingerprints or secret keys. Building a virtual private application network is just a matter of setting the same crypto key on two or more sites.
BigSpeed Secure Socket Library can be used both on clie...

categ.: >

...ption.
The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with...contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To unzip, a user must provide the same password that was used when creating the ...user must provide the same password that was used when creating the self-extracting EXE. AES encryption is much stronger than standard ZIP encryption, which is regarded by security experts as being unsecure.
Chilkat`s stream...s being unsecure.
Chilkat`s streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user`s computer, even if that computer has very little memory....

categ.: >

...experienced programmers to add strong encryption and authentication services to their prog...ication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level deta... more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption .... Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following:
· AES (Rijndael)
· Blowfish
· DES, 3DES
· RC2, RC4, RC5
The following hash algorithms are available in the library:
· MD2, MD4, MD5
· RIPEMD-160
· SHA
It offers services such as:
· S/MIME
· SSL/TLS
· ssh
It features various hashed message authentication code algorithms:
· HMAC-MD5, ...

categ.: >

...re able to encrypt data files with the most secure encryption technique - by adding the da...n technique - by adding the data into an image. This technique is called steganography.
What Cryptor makes special is the fact that it produces the...graphy.
What Cryptor makes special is the fact that it produces the smallest possible output images, whereby the size of the key image is almost independent from the size of the data which will be encrypted . The design of C...will be encrypted . The design of Cryptor allows some automatisms, in order to provide a one click encryption.
The lite version is Freeware, but does not include the buddy manager an encrypt only file with a size of approximately 50 kb (after compression)
Cryptor is save:
Only by using encrypted- & key-image with Cryptor the original data can be decrypted again.
Cryptor is fast:
optimized image processing for ...

categ.: >

...an be moved in a highly scripted container file (which was created with TrueCrypt). This c...reated with TrueCrypt). This can be opened with password if needed, this container file will mount as another drive. When moving the data is first c...er file will mount as another drive. When moving the data is first copied, while no error occurs, the original folder is deleted, at the direction of the container, the data can be shredded with the ERASER program. With autom...with the ERASER program. With automatically generated hard links stored in the container file folder in the PC file system are displayed. In this state you can work as normal with the stored data, En/decryption is performed "on-the-fly", the data in the container will always be encrypted. As long as an application accesses the lists of container file that TrueCrypt prevented the closure of the container, it is a...

categ.: >

...gram that uses the free Diamond 2 Encryption Algorithm. Full source code and documentation... source code and documentation of the algorithm and the master`s thesis it is based on are included. It compiles with Gnu C++ and other compilers, s...sed on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled for the Win32 command line (for long filena...Win32 command line (for long filename support) and author contact information has been updated. The encryption key may be a passphrase on the command line or it may be contained in a file. You may use the included encryption/decryption source code in your own products at no charge. This software is free, however you may send the author donations to express appreciation if you like....

categ.: >

... a postcard as all emails are transmitted in an unsecured form. Of course, you may believe...rm. Of course, you may believe that your personal email does not contain any private information, but everyone has got something to keep in secret. ...vate information, but everyone has got something to keep in secret. There is really only one way to protect your email privacy - using text encryption software. Want to send secure emails to your friends or partners so nobody... your friends or partners so nobody can read them? Encryption and Decryption is easy-to-use text encryption freeware. Encryption And Decryption provides solution for both individuals and corporations. Using text encryption freeware you can easily encrypt and decrypt text (messages), so you can send emails from home or office in a safe way. Protect your privacy using free text encryption software....